Professional Documents
Culture Documents
Final Report1
Final Report1
Final Report1
Submitted to
NOV-DEC – 2010
logo oist
CERTIFICATE
This is to certify that the project entitled “Image Steganography” being submitted
I take the opportunity to express my cordial gratitude and deep sense of indebtedness to our
guide Mr. Prateek Buchke and Ms. Fehreen Hasan for the valuable guidance and inspiration
throughout the project duration. We feel thankful to them for his innovative ideas, which led to
successful completion of this project work. We feel proud and fortune to work under such an
outstanding mentor in the field of “Image Steganography” They have always
welcomed our problem and helped us to clear our doubt. We will always be grateful to them for
providing us moral support and sufficient time.
We owe sincere thanks to Dr. K. Chaudhary, Director OIST and Prof. N. K. Mittal,
Principal OIST, who helped us duly in time during our project work in the Department.
At the same time, We would like to thank Prof. Sreeja Nair (HOD, IT) and all other
faculty members and all non-teaching staff of department of Information Technology for their
valuable co-operation.
This is to certify that the project entitled “Image Steganography” being submitted by
Himanshu Agrawal, Rizwan Qureshi students of 7th semester, Degree in Information
Technology have done their work as MAJOR PROJECT for Partial fulfillment of the degree
from RGPV, Bhopal (M.P.).
TABLE OF CONTENT
ABSTRACT
LIST OF FIGURES
LIST OF GRAPH
LIST OF TABLE
CHAPTER 1: INTRODUCTION
1.1 Overview
1.2 Objective & Scope of project
1.3 Organization of Report
1.4 Existing System
larger one in such a way that someone can not know the presence or contents
1.1 OVERVIEW:
Since the rise of the Internet one of the most important factors of information
technology and communication has been the security of information. Cryptography
was created as a technique for securing the secrecy of communication and many
different methods have been developed to encrypt and decrypt data in order to keep
the message secret. Unfortunately it is sometimes not enough to keep the contents
of a message secret, it may also be necessary to keep the existence of the message
secret. The technique used to implement this, is called Steganography.
The word steganography is derived from the Greek words “stegos” meaning
“cover” and “grafia” meaning “writing” defining it as “covered writing”. In image
steganography the information is hidden exclusively in images.
mp3, even a TCP/IP packet among other things. It is the object that will ‘carry’ the
This can be anything from a password, a pattern, a black-light, or even lemon juice.
1.2 OBJECTIVE:
ORGANIZATION OF REPORT:
our project is a stand alone application. This application is provide user to encrypt
the text or image. This is provide security of our secret text and image. In this user
first upload a image and then scan image and then write a text and encrypt this text
with image. In this application we can also encrypt an image with in a image.
2.1.1.User Interface :-
The user interface for this system will have to be simple and clear. Most
importantly, the leave format easy to read, easy to understand and
accessible. The color scheme should be appropriate to provide
familiarity with the application and there should be no contrast issues.
2.2 Feasibility Report
Types of Feasibility
Economic Feasibility
Economic analysis is most frequently used for evaluation of the
effectiveness of the system. More commonly knows as cost/benefit
analysis the procedure is to determine the benefit and saving that are
expected from a system and compare them with costs, decisions is
made to design and implement the system. This part of feasibility
study gives the top management the economic justification for the
new system. This is an important input to the management the
management, because very often the top management does not like to
get confounded by the various technicalities that bound to be
Behavior Feasibility
We are provide the security of our secret image and text data.
Sender encrypt the text in image and send it and then receiver receive
this encrypted image and decrypt it read the secret message.
Decryption: in this receiver decrypt the encrypted msg and read the
secret message.
Spiral Model
Iterative model
Incremental model
The five stages of the SDLC are designed to build on one another,
taking the outputs from the previous stage, adding additional effort,
and producing results that leverage the previous effort and are directly
traceable to the previous stages.
This top-down approach is intended to result in a quality product that
satisfies the original intentions of the customer.
The requirements gathering process takes as its input the goals identified in
the high-level requirements section of the project plan. Each goal will be
refined into a set of one or more requirements. These requirements define the
major functions of the intended application, define operational data areas and
reference data areas, and define the initial data entities. Major functions
These requirements are fully described in the primary deliverables for this
stage: the Requirements Document and the Requirements Traceability
Matrix (RTM). the requirements document contains complete descriptions of
each requirement, including diagrams and references to external documents
as necessary. Note that detailed listings of database tables and fields are not
included in the requirements document. The title of each requirement is also
The design stage takes as its initial input the requirements identified
in the approved requirements document. For each requirement, a set
of one or more design elements will be produced as a result of
interviews, workshops, and/or prototype efforts. Design elements
describe the desired software features in detail, and generally include
functional hierarchy diagrams, screen layout diagrams, tables of
business rules, business process diagrams, pseudocode, and a
The implementation stage takes as its primary input the design elements
described in the approved design document. For each design element, a set
of one or more software artifacts will be produced. Software artifacts include
but are not limited to menus, dialogs, data management forms, data reporting
formats, and specialized procedures and functions.Appropriate test cases will
be developed for each set of functionally related software artifacts, and an
online help system will be developed to guide users in their interactions with
the software.
During the verification and test stage, the software artifacts, online
help, and test data are migrated from the development environment to
a separate test environment. At this point, all test cases are run to
verify the correctness and completeness of the software. Successful
execution of the test suite confirms a robust and complete migration
capability.
During this stage, reference data is finalized for production use and
production users are identified and linked to their appropriate roles.
The final reference data(or links to reference data source files) and
production user list are compiled into the Production Initiation Plan.
The outputs of the verification and test stage include an integrated set
of software, an online help system, an implementation map, a
production initiation plan that describes reference data and
production users, an acceptance plan which contains the final suite of
test cases, and an updated project plan.
The following iteration have been followed during the use of spiral
model for our system.
The project plan establishes a bird's eye view of the intended software
product, and uses this to establish the basic project structure, evaluate
feasibility and risks associated with the project, and describe appropriate
management and technical approaches
The most critical section of the project plan is a listing of high-level product
requirements, also referred to as goals. All of the software product
requirements to be developed during the requirements definition stage flow
from one or more of these goals. The minimum information for each goal
consists of a title and textual description, although additional information
The coefficients ab, bb, cb and db are given in the following table.
Software project ab bb cb db
Add Image
«extend»
Update Image
Use key
Edit
Text/image
«extend»
Sender Encrypt Image
view key
Send Image
Receive Image
Decrypt Image
Receiver
Decrypt Text/image
Encrypt
Pick Image
Send Image
Receive Message
Decrypt Image
[Encrypt] [Decrypt]
Idle
LEVEL 0
LEVEL 2
Encrypt
Pick
Image
Merge text or
image with
Image
Send
ORIENTAL INSTITUTE OF SCIENCE & TECHNOLOGY
P-44 the
Image
Receive encrypted message
In order to send the data from one node to the other with efficiency the
following software is to be needed
Operating System: XP
.NET AND C#
As Such no need for any Extra hardware in this software but there must be an
adequate memory i.e. a large size Hard disk to support the encryption program.
Processor
[1] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen,
IEEE Computer, 31(2) (1998) 26- 34.
[2] J.C. Judge, Steganography: Past, present, future. SANS Institute publication,
http://www.sans.org/ reading_room/whitepapers/stenganography/552.php, 2001.
[5] S.B. Sadkhan, Cryptography: Current status and future trends, in:
Proceedings of IEEE International Conference on Information &
Communication Technologies: From Theory to Applications, Damascus. Syria,
April 19-23, 2004, pp. 417-418.
[6] G.J. Simmons, The prisoners’ problem and the subliminal channel, in:
Proceedings of International conference on Advances in Cryptology,
CRYPTO83, August 22-24, 1984, pp. 51-67.
[9] R.J Andersen and F.A.P Petitcolas. On the limits of steganography. IEEE
Journal of Selected Areas in Communications,Special Issue on Copyright and
Privacy Protection, 16(4):474–481, 1998.
LINKS:
http://www.google.com
http://www.wikipedia.com